Apache HTTP Server 2.4.50 - RCE Lab# CVE-2021-42013-LAB
Apache HTTP Server 2.4.50 - RCE Lab
**exploit.sh :-** **https://github.com/jas9reet/CVE-2021-42013-LAB/blob/main/exploit.sh**
**Usage**
* docker pull jas9reet/cve-2021-42013-lab
* docker run -dit -p 8088:80 **jas9reet/cve-2021-42013-lab**
**Vulnerable Application Access**
* ****VICTIM-IP-ADDRESS****:8088
**Exploitation Commands**
* bash exploit.sh -u http://victim-ip:8088 -c "whoami"
[4.0K] /data/pocs/42daa9f6b1569badf7d84afbb17354cd7e855113
├── [ 126] Dockerfile
├── [ 462] exploit.sh
├── [ 20K] httpd.conf
├── [1.2K] index.html
└── [ 421] README.md
0 directories, 5 files